CVE-2026-22719

HIGH
2026-02-25 [email protected]
8.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 12, 2026 - 21:55 vuln.today
Added to CISA KEV
Mar 04, 2026 - 15:08 cisa
CISA KEV
Patch Released
Mar 04, 2026 - 15:08 nvd
Patch available
CVE Published
Feb 25, 2026 - 20:23 nvd
HIGH 8.1

Description

VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.  To remediate CVE-2026-22719, apply the patches listed in the 'Fixed Version' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001  Workarounds for CVE-2026-22719 are documented in the 'Workarounds' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001

Analysis

VMware Aria Operations contains a command injection vulnerability (CVE-2026-22719, CVSS 8.1) that allows unauthenticated remote attackers to execute arbitrary commands during support-assisted product migration. KEV-listed with patches available, this vulnerability targets the infrastructure monitoring platform that has visibility into the entire virtualized environment.

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all VMware Aria Operations instances in your environment and determine which are actively undergoing support-assisted migrations—prioritize these for immediate patching. Within 7 days: Apply the available vendor patch to all affected systems; for instances in active migration, coordinate with VMware support to complete migrations before patching or apply patches during maintenance windows. …

Sign in for detailed remediation steps.

Priority Score

98
Low Medium High Critical
KEV: +50
EPSS: +7.4
CVSS: +40
POC: 0

Share

CVE-2026-22719 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy